Enforce a stronger security posture without impacting productivity
Simply enforce two-factor authentication (2FA) via your preferred provider and more easily protect user access to resources and networks.
When passwords are all that’s standing between your critical corporate resources and the Internet, the attack surface is left wide open. Using Perimeter 81 not only presents a smaller and segmented attack surface, it reduces it further by allowing admins to add a second layer of authentication to individual networks and applications.
Perfect for highly important resources that need additional protection, 2FA is easily applied to applications in your network such as Slack or Salesforce to ensure that employees attempting to gain access also need to verify their identity further via SMS or mobile app.
Make secure login and policy-based access easy with seamless Single Sign-On integration.
Increasing security without disrupting employees’ daily routine is crucial for the successful reduction of corporate vulnerability to attacks. This goal can be achieved using Single Sign-On integration.
Perimeter 81 includes policy-based access integrated with LDAP, Google Suite, Azure, OKTA and more, so secure network access is a natural extension of your employees’ work environment. Add convenience to your network security and onboard your entire team with ease.
Take advantage of a full range of encryption protocols, ensuring secure and consistent traffic tunneling that also fits your specific infrastructure.
Maintain strong, bank-level AES-256 encryption on all data within your networks, both static and in transit. Site-to-site IPSec or WireGuard connections offer permanent gateway-enabled tunnels for traffic between users and resources in the network, or you can easily connect users to cloud resources via an OS-based point-to-point tunnel.
Perimeter 81 encryption methods support both full and split tunneling, and are further enforced with an Always-On VPN option via our agent. This stops the Internet connection to any employee device for which the encrypted tunnel drops, so that hackers have no opportunity to breach the network.
Ensure that employees who have a habit of browsing from unprotected or risky Wi-Fi networks can’t get access when their connection is exposed.
At the end of the day, it’s on employees to manage their personal security hygiene in a way that protects the organization. But using strong passwords or avoiding suspicious emails is not enough, and that’s where Automatic Wi-Fi Protection fits in.
Strengthen your employees’ security posture by automatically enforcing encrypted tunnels on untrusted connections. If an employee decides to connect from a potentially unsafe or unrecognized Wi-Fi network, they will be required to use an encrypted Perimeter 81 connection.
For the users, the desktop Agent with Two-Factor Authentication has been very easy to use. Once we went live with Perimeter 81, users commented that they really noticed the improved performance and how rapidly they can connect to network resources wherever they are located. This is the upside of Site-to-Site Interconnectivity and Split Tunneling features.